Notices |
|
xi | |
Trademarks |
|
xii | |
Preface |
|
xiii | |
The team that wrote this redbook |
|
xiv | |
Become a published author |
|
xvii | |
Comments welcome |
|
xvii | |
|
Part 1. Patterns for e-business and Extended Enterprise |
|
|
1 | (134) |
|
|
3 | (8) |
|
An introduction to this document |
|
|
4 | (1) |
|
Patterns for e-business SOA series of redbooks |
|
|
4 | (2) |
|
|
6 | (5) |
|
Introduction to the Patterns for e-business |
|
|
11 | (16) |
|
The Patterns for e-business layered asset model |
|
|
12 | (2) |
|
How to use the Patterns for e-business |
|
|
14 | (11) |
|
Selecting a Business, Integration, Composite pattern, or a Custom design |
|
|
14 | (5) |
|
Selecting Application patterns |
|
|
19 | (2) |
|
|
21 | (2) |
|
Reviewing Product mappings |
|
|
23 | (1) |
|
Reviewing guidelines and related links |
|
|
24 | (1) |
|
Patterns for e-business naming conventions |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
27 | (36) |
|
Overview of Extended Enterprise |
|
|
28 | (1) |
|
|
28 | (12) |
|
|
29 | (1) |
|
Key technology attributes |
|
|
30 | (5) |
|
Key requirements for integration flexibility |
|
|
35 | (1) |
|
The on demand Operating Environment |
|
|
35 | (5) |
|
Approaches for delivering the Extended Enterprise |
|
|
40 | (23) |
|
|
41 | (18) |
|
|
59 | (1) |
|
Ensuring quality of service |
|
|
60 | (3) |
|
Extended Enterprise pattern |
|
|
63 | (24) |
|
Using the Extended Enterprise business pattern |
|
|
64 | (1) |
|
|
65 | (3) |
|
|
65 | (1) |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
Extended Enterprise application patterns |
|
|
68 | (19) |
|
Exposed Direct Connection application pattern |
|
|
71 | (3) |
|
Exposed Direct Connection: Message Connection variation |
|
|
74 | (1) |
|
Exposed Direct Connection: Call Connection variation |
|
|
75 | (1) |
|
Exposed Broker application pattern |
|
|
76 | (2) |
|
Exposed Broker: Router variation |
|
|
78 | (2) |
|
Exposed Serial Process application pattern |
|
|
80 | (3) |
|
Exposed Serial Process: Workflow variation |
|
|
83 | (4) |
|
|
87 | (12) |
|
Runtime product descriptions |
|
|
88 | (8) |
|
IBM WebSphere Application Server V6 |
|
|
88 | (3) |
|
IBM DB2 Universal Database Enterprise Server Edition V8.2 |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
IBM WebSphere Business Integration Message Broker V5.0 |
|
|
94 | (1) |
|
IBM WebSphere Business Integration Server Foundation V5.1 |
|
|
94 | (1) |
|
IBM WebSphere Partner Gateway V6.0 |
|
|
95 | (1) |
|
Development product descriptions |
|
|
96 | (3) |
|
IBM Rational Application Developer V6 |
|
|
96 | (1) |
|
IBM WebSphere Studio Application Developer Integration Edition V5.1 |
|
|
97 | (2) |
|
Extended Enterprise runtime patterns |
|
|
99 | (26) |
|
Extended Enterprise runtime patterns |
|
|
100 | (2) |
|
|
100 | (2) |
|
|
102 | (7) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
Directory and Security Services |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Business Service Choreography |
|
|
108 | (1) |
|
|
108 | (1) |
|
Exposed Direct Connection runtime pattern |
|
|
109 | (3) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Exposed Broker runtime pattern |
|
|
112 | (3) |
|
|
112 | (1) |
|
|
113 | (2) |
|
|
115 | (2) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Exposed Serial Process runtime pattern |
|
|
117 | (3) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Exposed Serial Workflow variation |
|
|
120 | (5) |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
125 | (10) |
|
|
126 | (1) |
|
Exposed Direct Connection product mapping |
|
|
126 | (3) |
|
|
127 | (1) |
|
|
127 | (2) |
|
Exposed Broker product mapping |
|
|
129 | (3) |
|
Exposed Broker: Generic profile |
|
|
129 | (1) |
|
Exposed Router variation: SOA profile |
|
|
130 | (2) |
|
Exposed Serial Process product mapping |
|
|
132 | (3) |
|
|
132 | (1) |
|
|
133 | (2) |
|
Part 2. Business scenario and guidelines |
|
|
135 | (20) |
|
Business scenario used in this book |
|
|
137 | (8) |
|
WS-I sample business scenario |
|
|
138 | (1) |
|
ITSO Good sample business scenario |
|
|
138 | (7) |
|
|
139 | (1) |
|
Applications in the supply chain management |
|
|
139 | (1) |
|
Example of using the ITSO Good sample application |
|
|
140 | (5) |
|
|
145 | (10) |
|
|
146 | (4) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (3) |
|
|
152 | (1) |
|
|
153 | (2) |
|
Part 3. Scenario implementation |
|
|
155 | (324) |
|
Exposed Direct Connection runtime pattern: generic profile |
|
|
157 | (80) |
|
|
158 | (1) |
|
|
159 | (18) |
|
Analyze business requirements |
|
|
160 | (1) |
|
|
160 | (2) |
|
|
162 | (13) |
|
|
175 | (2) |
|
|
177 | (38) |
|
Exposed Direct Connection interaction: Generic profile |
|
|
177 | (2) |
|
Securing applications using WS-Security |
|
|
179 | (6) |
|
Generating sample key stores |
|
|
185 | (3) |
|
Configuring WS-Security integrity |
|
|
188 | (16) |
|
Configuring WS-Security confidentiality |
|
|
204 | (10) |
|
Exporting EAR files from Rational Application Developer |
|
|
214 | (1) |
|
|
215 | (22) |
|
|
215 | (2) |
|
Configuring WebSphere Application Server profiles |
|
|
217 | (2) |
|
|
219 | (1) |
|
Installing the applications |
|
|
220 | (3) |
|
Securing the application server using Global Security |
|
|
223 | (1) |
|
Configuring an HTTP server for SSL pass-through |
|
|
224 | (3) |
|
Changing the Web service client bindings configuration |
|
|
227 | (2) |
|
|
229 | (4) |
|
Viewing SOAP messages using the TCP/IP Monitor |
|
|
233 | (4) |
|
Exposed Direct Connection runtime pattern: SOA profile |
|
|
237 | (102) |
|
|
238 | (1) |
|
|
239 | (11) |
|
Analyze IT infrastructure requirements |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (7) |
|
|
249 | (1) |
|
|
250 | (2) |
|
Exposed Direct Connection interaction: SOA profile |
|
|
251 | (1) |
|
|
252 | (87) |
|
|
252 | (2) |
|
Creating the basic infrastructure |
|
|
254 | (3) |
|
Create and configure a service integration bus |
|
|
257 | (24) |
|
Create and configure the Web service gateway |
|
|
281 | (12) |
|
Connecting the ESB and the Exposed ESB Gateway |
|
|
293 | (11) |
|
Adding WS-Security to the Web service gateway |
|
|
304 | (35) |
|
Exposed Broker runtime pattern: generic profile |
|
|
339 | (48) |
|
|
340 | (1) |
|
|
341 | (5) |
|
Analyze business requirements |
|
|
341 | (1) |
|
|
341 | (2) |
|
|
343 | (2) |
|
|
345 | (1) |
|
|
346 | (19) |
|
Scenario implementation: Exposed Broker runtime pattern |
|
|
347 | (1) |
|
|
348 | (4) |
|
Developing a mediation handler class |
|
|
352 | (12) |
|
Assigning and exporting the mediation handlers |
|
|
364 | (1) |
|
|
365 | (22) |
|
|
366 | (1) |
|
Creating the basic infrastructure |
|
|
367 | (1) |
|
Configuring the service integration bus |
|
|
368 | (3) |
|
Creating the gateway service |
|
|
371 | (5) |
|
Installing and defining the mediation application |
|
|
376 | (4) |
|
Creating additional destinations |
|
|
380 | (2) |
|
Changing the Warehouse endpoint URL |
|
|
382 | (1) |
|
|
383 | (2) |
|
Adding WS-Security to the solution |
|
|
385 | (2) |
|
Exposed Router runtime pattern: SOA profile |
|
|
387 | (32) |
|
|
388 | (1) |
|
|
389 | (7) |
|
Analyze business requirements |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (3) |
|
|
394 | (2) |
|
|
396 | (1) |
|
Scenario implementation: Exposed Router SOA profile interaction |
|
|
396 | (1) |
|
|
397 | (22) |
|
|
397 | (1) |
|
Creating the basic infrastructure |
|
|
398 | (1) |
|
Scenario implementation overview |
|
|
399 | (1) |
|
Configuring WebSphere Partner Gateway |
|
|
400 | (14) |
|
Configuring WebSphere Application Server |
|
|
414 | (2) |
|
Testing the WebSphere Partner Gateway configuration |
|
|
416 | (3) |
|
Exposed Serial Process runtime pattern: generic profile |
|
|
419 | (40) |
|
|
420 | (1) |
|
|
420 | (5) |
|
Analyze business requirements |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
425 | (27) |
|
Scenario implementation: Serial process interaction |
|
|
425 | (2) |
|
Creating the basic infrastructure |
|
|
427 | (2) |
|
Configuring WebSphere Studio |
|
|
429 | (1) |
|
Creating Manufacturer and LoggingFacility Web services clients |
|
|
429 | (6) |
|
Create Java proxy classes |
|
|
435 | (4) |
|
Create a business process using Process Choreographer |
|
|
439 | (10) |
|
Create the Warehouse service |
|
|
449 | (3) |
|
Exporting the Enterprise Application files |
|
|
452 | (1) |
|
|
452 | (7) |
|
Testing with Web Services Explorer |
|
|
453 | (2) |
|
Testing the business process with ITSO Good |
|
|
455 | (3) |
|
Deploying the business process |
|
|
458 | (1) |
|
Exposed Serial Process runtime pattern: SOA profile |
|
|
459 | (20) |
|
|
460 | (1) |
|
|
460 | (5) |
|
Analyze the business requirement |
|
|
460 | (1) |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
462 | (3) |
|
|
465 | (6) |
|
Scenario implementation: Serial process interaction |
|
|
465 | (1) |
|
Creating the basic infrastructure |
|
|
466 | (2) |
|
Creating a Manufacturer Web service client |
|
|
468 | (1) |
|
Modify the Manufacturer proxy class |
|
|
469 | (1) |
|
Modify the Warehouse business process |
|
|
469 | (2) |
|
Generate deployment code and export the process |
|
|
471 | (1) |
|
|
471 | (8) |
|
|
472 | (1) |
|
Configuring the Exposed ESB Gateway |
|
|
473 | (3) |
|
Testing the business process with ITSO Good |
|
|
476 | (3) |
|
|
479 | (48) |
|
Appendix A. Additional material |
|
|
481 | (2) |
|
Locating the Web material |
|
|
481 | (1) |
|
|
481 | (1) |
|
System requirements for downloading the Web material |
|
|
482 | (1) |
|
How to use the Web material |
|
|
482 | (1) |
|
Appendix B. Microsoft .NET Web services |
|
|
483 | (30) |
|
B.1 Overview and context of .NET Web services |
|
|
484 | (1) |
|
B.1.1 How Microsoft .NET is used in the Redbook scenarios |
|
|
484 | (1) |
|
B.1.2 Microsoft .NET Web service development overview |
|
|
485 | (1) |
|
B.2 Implementing a Microsoft .NET Web service |
|
|
486 | (1) |
|
B.2.1 Create a new Web service project |
|
|
487 | (1) |
|
B.2.2 Generating a C# file using a WSDL file and wsdl.exe |
|
|
487 | (1) |
|
B.2.3 Modifying the C# file |
|
|
488 | (3) |
|
B.2.4 Finalizing and deploying the Web service |
|
|
491 | (2) |
|
B.2.5 Testing the .NET Web service |
|
|
493 | (1) |
|
Implementing a test J2EE Client |
|
|
494 | (1) |
|
B.2.6 Creating a new Rational Application Developer project |
|
|
494 | (1) |
|
B.2.7 Importing the necessary WSDLs and XSDs |
|
|
495 | (2) |
|
B.2.8 Deploying and testing the J2EEClient |
|
|
497 | (3) |
|
B.3 Enabling transport-level security with SSL |
|
|
500 | (1) |
|
B.3.1 Configuring the .NET Web service to require SSL |
|
|
501 | (6) |
|
B.3.2 Importing the SSL certificate into a key database |
|
|
507 | (6) |
|
Appendix C. CICS Transaction Server Web services |
|
|
513 | (4) |
|
C.1 CICS Transaction Server V3.1 Web services support |
|
|
514 | (1) |
|
C.2 Creating Web services for CICS |
|
|
514 | (1) |
|
C.2.1 CICS Web services assistant |
|
|
515 | (1) |
|
C.2.2 CICS resources for Web services |
|
|
515 | (1) |
|
C.3 Creating and hosting a ManufacturerC Web service |
|
|
516 | (1) |
|
Appendix D. WSAdmin Automation Platform |
|
|
517 | (10) |
|
D.1 Employing WSAdmin Automation Platform |
|
|
518 | (1) |
|
D.1.1 Overview of WSAdmin Automation Platform |
|
|
518 | (1) |
|
D.1.2 Downloading WSAdmin Automation Platform |
|
|
519 | (1) |
|
D.1.3 Running WSAdmin Automation Platform |
|
|
520 | (2) |
|
D.1.4 WSAdmin Automation Platform examples |
|
|
522 | (4) |
|
D.1.5 The You Name It option |
|
|
526 | (1) |
|
Abbreviations and acronyms |
|
|
527 | (6) |
|
|
529 | (4) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
531 | (2) |
Index |
|
533 | |